| Commit message (Expand) | Author | Age | Files | Lines |
* | Avoid a NULL pointer deref when X509_get_pubkey() returns NULL. | doug | 2015-03-15 | 2 | -4/+8 |
* | remove incorrect statement. the standard *does* require calloc to check | tedu | 2015-03-14 | 1 | -7/+2 |
* | delay EVP_MD_CTX_init so we don't forget to clean it up. | tedu | 2015-03-11 | 2 | -6/+8 |
* | Reject DH keys sent by a server if they are considered too small; inspired | miod | 2015-03-08 | 2 | -2/+24 |
* | Do not use sha512-parisc for now, as it is subtly bugged - passes the sha | miod | 2015-03-05 | 2 | -2/+6 |
* | Update comment to match code; Caspar Schutijserlibressl-v2.1.4 | millert | 2015-03-02 | 1 | -2/+2 |
* | Fix a minor information leak that was introduced in t1_lib.c r1.71, whereby | jsing | 2015-03-02 | 2 | -4/+4 |
* | Prefix function parameter names with underscores in tls.h, since this makes | jsing | 2015-02-26 | 1 | -42/+44 |
* | Fix CVE-2014-3570: properly calculate the square of a BIGNUM value. | bcook | 2015-02-25 | 6 | -1308/+606 |
* | Fix CVE-2015-0205: Do not accept client authentication with Diffie-Hellman | bcook | 2015-02-25 | 2 | -4/+4 |
* | we don't let strtonum errors bleed through now. | tedu | 2015-02-24 | 1 | -4/+2 |
* | Set errno to EINVAL, instead of letting ERANGE escape out. | tedu | 2015-02-24 | 1 | -2/+4 |
* | fourth batch of perlpod(1) to mdoc(7) conversion | schwarze | 2015-02-23 | 37 | -1276/+2521 |
* | Bump libcrypto and libssl majors, due to various recent churn. | jsing | 2015-02-22 | 4 | -4/+4 |
* | Reluctantly add server-side support for TLS_FALLBACK_SCSV. | jsing | 2015-02-22 | 15 | -25/+159 |
* | There is not much point constructing an SSL_CIPHER, then calling | jsing | 2015-02-22 | 2 | -14/+6 |
* | Remove IMPLEMENT_STACK_OF noops. | jsing | 2015-02-22 | 4 | -8/+4 |
* | Bump libtls major due to symbol removal. | jsing | 2015-02-22 | 1 | -3/+2 |
* | Rename tls_config_insecure_noverifyhost() to | jsing | 2015-02-22 | 4 | -21/+20 |
* | Check return values when setting dheparams and ecdhecurve for the default | jsing | 2015-02-22 | 1 | -11/+14 |
* | In the interests of being secure by default, make the default TLS ciphers | jsing | 2015-02-22 | 2 | -2/+17 |
* | explain how tls_accept_socket works. | tedu | 2015-02-21 | 1 | -2/+9 |
* | tls_config_set_protocols is really void. Greg Martin. | tedu | 2015-02-21 | 1 | -3/+3 |
* | fill out docs a bit more, notably the read/write again behaviors. | tedu | 2015-02-21 | 1 | -3/+27 |
* | If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument, | jsing | 2015-02-19 | 2 | -6/+16 |
* | Memory leak in error path. Coverity CID 78822. | miod | 2015-02-17 | 2 | -16/+18 |
* | Amend documentation for AI_ADDRCONFIG | jca | 2015-02-16 | 1 | -2/+4 |
* | third batch of perlpod(1) to mdoc(7) conversion | schwarze | 2015-02-16 | 25 | -1367/+2121 |
* | Avoid calling BN_CTX_end() on a context that wasn't started. | doug | 2015-02-15 | 2 | -8/+8 |
* | Regen | miod | 2015-02-15 | 6 | -528/+564 |
* | s/tls_load_keys/tls_load_file/ | jsing | 2015-02-15 | 1 | -2/+2 |
* | Document tls_config_parse_protocols() and update documentation for | jsing | 2015-02-15 | 2 | -5/+27 |
* | If we decide to discard the provided seed buffer because its size is not | miod | 2015-02-15 | 2 | -16/+12 |
* | Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904 | miod | 2015-02-15 | 2 | -12/+16 |
* | In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so that | miod | 2015-02-15 | 2 | -12/+10 |
* | lsearch and lfind return void * | tedu | 2015-02-15 | 1 | -4/+4 |
* | Remove asn1_ex_i2c() prototype, now that this function has been made static; | miod | 2015-02-14 | 2 | -4/+2 |
* | Words read better when they are separated by spaces. | miod | 2015-02-14 | 2 | -2/+2 |
* | 1.18 would introduce a possible out-of-bounds access in the error path; | miod | 2015-02-14 | 2 | -14/+10 |
* | Remove DEBUG_PKCS5V2 code. | miod | 2015-02-14 | 2 | -50/+2 |
* | Unchecked allocations in x509_name_canon(). | miod | 2015-02-14 | 2 | -2/+10 |
* | Memory leak upon error in X509_add1_{trust,reject}_object. | miod | 2015-02-14 | 2 | -14/+46 |
* | Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto). | jsing | 2015-02-14 | 2 | -6/+20 |
* | Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it in | miod | 2015-02-14 | 10 | -282/+14 |
* | Make asn1_ex_i2c() static. ok jsing@ | miod | 2015-02-14 | 2 | -4/+8 |
* | Memory leak in `should not happen' condition; Coverity CID 78889. | miod | 2015-02-14 | 2 | -8/+8 |
* | Memory leak upon error; Coverity CID 78857 | miod | 2015-02-14 | 2 | -2/+8 |
* | Check i2d_name_canon() for failure (negative return). Coverity CID 78888. | miod | 2015-02-14 | 2 | -12/+16 |
* | Possible NULL pointer dereferences. Coverity CID 21719, 21732. | miod | 2015-02-14 | 4 | -6/+14 |
* | Potential NULL dereference in the error path; Coverity CID 21720 | miod | 2015-02-14 | 2 | -4/+4 |